Analysis
-
max time kernel
126s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
09-08-2023 15:08
Behavioral task
behavioral1
Sample
0a2a59874f8d6cab3c462d6cf4b2848acd069c529ce9672ea79e43c42cf4963e.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
0a2a59874f8d6cab3c462d6cf4b2848acd069c529ce9672ea79e43c42cf4963e.exe
Resource
win10v2004-20230703-en
General
-
Target
0a2a59874f8d6cab3c462d6cf4b2848acd069c529ce9672ea79e43c42cf4963e.exe
-
Size
101KB
-
MD5
2692ec65a90620db8d016bbf671413f2
-
SHA1
bf09a997f52037d2b11f1a9010ddc451ccefcbe2
-
SHA256
0a2a59874f8d6cab3c462d6cf4b2848acd069c529ce9672ea79e43c42cf4963e
-
SHA512
948a879b720d2ecb4e29f8805ca5f86774f7518ceb7828cd84f3350ff31d7164e6809fa99381c11ff5a90f6a17e95243cef33fe0ed077ec779c5d0351633be8b
-
SSDEEP
1536:0oaj1hJL1S9t0MIeboal8bCKxo7h0RP0IwHNz30rtroGCry:P0hpgz6xGhTIwHF30BENry
Malware Config
Signatures
-
Sakula payload 6 IoCs
Processes:
resource yara_rule behavioral2/memory/3332-133-0x0000000000C60000-0x0000000000C7B000-memory.dmp family_sakula C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe family_sakula behavioral2/memory/4680-138-0x0000000000240000-0x000000000025B000-memory.dmp family_sakula C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe family_sakula behavioral2/memory/3332-139-0x0000000000C60000-0x0000000000C7B000-memory.dmp family_sakula behavioral2/memory/4680-140-0x0000000000240000-0x000000000025B000-memory.dmp family_sakula -
Executes dropped EXE 1 IoCs
Processes:
MediaCenter.exepid process 4680 MediaCenter.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
0a2a59874f8d6cab3c462d6cf4b2848acd069c529ce9672ea79e43c42cf4963e.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\MicroMedia = "C:\\Users\\Admin\\AppData\\Local\\Temp\\MicroMedia\\MediaCenter.exe" 0a2a59874f8d6cab3c462d6cf4b2848acd069c529ce9672ea79e43c42cf4963e.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
0a2a59874f8d6cab3c462d6cf4b2848acd069c529ce9672ea79e43c42cf4963e.exedescription pid process Token: SeIncBasePriorityPrivilege 3332 0a2a59874f8d6cab3c462d6cf4b2848acd069c529ce9672ea79e43c42cf4963e.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
0a2a59874f8d6cab3c462d6cf4b2848acd069c529ce9672ea79e43c42cf4963e.execmd.exedescription pid process target process PID 3332 wrote to memory of 4680 3332 0a2a59874f8d6cab3c462d6cf4b2848acd069c529ce9672ea79e43c42cf4963e.exe MediaCenter.exe PID 3332 wrote to memory of 4680 3332 0a2a59874f8d6cab3c462d6cf4b2848acd069c529ce9672ea79e43c42cf4963e.exe MediaCenter.exe PID 3332 wrote to memory of 4680 3332 0a2a59874f8d6cab3c462d6cf4b2848acd069c529ce9672ea79e43c42cf4963e.exe MediaCenter.exe PID 3332 wrote to memory of 456 3332 0a2a59874f8d6cab3c462d6cf4b2848acd069c529ce9672ea79e43c42cf4963e.exe cmd.exe PID 3332 wrote to memory of 456 3332 0a2a59874f8d6cab3c462d6cf4b2848acd069c529ce9672ea79e43c42cf4963e.exe cmd.exe PID 3332 wrote to memory of 456 3332 0a2a59874f8d6cab3c462d6cf4b2848acd069c529ce9672ea79e43c42cf4963e.exe cmd.exe PID 456 wrote to memory of 864 456 cmd.exe PING.EXE PID 456 wrote to memory of 864 456 cmd.exe PING.EXE PID 456 wrote to memory of 864 456 cmd.exe PING.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\0a2a59874f8d6cab3c462d6cf4b2848acd069c529ce9672ea79e43c42cf4963e.exe"C:\Users\Admin\AppData\Local\Temp\0a2a59874f8d6cab3c462d6cf4b2848acd069c529ce9672ea79e43c42cf4963e.exe"1⤵
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exeC:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe2⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 & del /q "C:\Users\Admin\AppData\Local\Temp\0a2a59874f8d6cab3c462d6cf4b2848acd069c529ce9672ea79e43c42cf4963e.exe"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.13⤵
- Runs ping.exe
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exeFilesize
101KB
MD51c97ede69985eb26017d63081773f8a1
SHA1f39a91ddf17a8e3331d5dc93c94ecddb87e96ea1
SHA256e279c68acd2b411a0dabe154de32982e103474fd30341bc8429df2d30ded5d2d
SHA5127aec8a73992efe1f9f55c9e6ab2c5494a065b3ac3da30901378a5eb63303dbaf84b0458768f7052ab6d3c228e75edc83de2831ca07e44144b5f7de62d291ed66
-
C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exeFilesize
101KB
MD51c97ede69985eb26017d63081773f8a1
SHA1f39a91ddf17a8e3331d5dc93c94ecddb87e96ea1
SHA256e279c68acd2b411a0dabe154de32982e103474fd30341bc8429df2d30ded5d2d
SHA5127aec8a73992efe1f9f55c9e6ab2c5494a065b3ac3da30901378a5eb63303dbaf84b0458768f7052ab6d3c228e75edc83de2831ca07e44144b5f7de62d291ed66
-
memory/3332-133-0x0000000000C60000-0x0000000000C7B000-memory.dmpFilesize
108KB
-
memory/3332-139-0x0000000000C60000-0x0000000000C7B000-memory.dmpFilesize
108KB
-
memory/4680-138-0x0000000000240000-0x000000000025B000-memory.dmpFilesize
108KB
-
memory/4680-140-0x0000000000240000-0x000000000025B000-memory.dmpFilesize
108KB